| /* | |
| * Copyright 2022 Google LLC | |
| * Licensed under the Apache License, Version 2.0 (the "License"); | |
| * you may not use this file except in compliance with the License. | |
| * You may obtain a copy of the License at | |
| * http://www.apache.org/licenses/LICENSE-2.0 | |
| * Unless required by applicable law or agreed to in writing, software | |
| * distributed under the License is distributed on an "AS IS" BASIS, | |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
| * See the License for the specific language governing permissions and | |
| * limitations under the License. | |
| */ | |
| /* Exploit shell quote with fuzzer's input as a parameter of echo. | |
| * This PoC is extended from a report in GitHub Advisory Database: | |
| * https://github.com/advisories/GHSA-g4rg-993r-mgx7 | |
| * The original report records a shell injection exploit in shell-quote v1.7.2, | |
| * we show that a similar shell corruption exploit still persists in v1.7.3, | |
| * after a commit that intends to fix the original exploit. | |
| * */ | |
| /* Fuzz the target program with buf generated by Jsfuzz. */ | |
| function fuzz(buf) { | |
| buf = String(buf) | |
| const childProcess = require('child_process'); | |
| const shellQuote = require('shell-quote'); | |
| childProcess.execSync(shellQuote.quote(['echo', buf])); | |
| } | |
| /* Run Jsfuzz. */ | |
| module.exports = { | |
| fuzz | |
| }; | |